Which of the following describes a Trojan horse?
A. Trojan horses track a computer user's keystrokes and any
websites visited in order to recognize trends or obtain credit card
information,
B. Trojan horses reproduce and attack computer systems, like email,
and do not depend on the users forwarding email attachments.
O c. Trojan horses enter a secure space, while an infected file proceeds
to be downloaded and run.
D. Trojan horses reproduce and attack computer systems, like email,
when users forward ails as attachments.

Respuesta :

Answer:

the answer is

c. Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.

Answer:

Trojan horses enter a secure space, while an infected file proceeds to be downloaded and run.

Explanation:

a p e x